Sciweavers

473 search results - page 43 / 95
» Computing excluded minors
Sort
View
97
Voted
LICS
2008
IEEE
15 years 6 months ago
Mechanizing the Metatheory of LF
LF is a dependent type theory in which many other formal systems can be conveniently embedded. However, correct use of LF relies on nontrivial metatheoretic developments such as p...
Christian Urban, James Cheney, Stefan Berghofer
89
Voted
ICA
2007
Springer
15 years 6 months ago
Linear Prediction Based Blind Source Extraction Algorithms in Practical Applications
Blind source extraction (BSE) is of advantages over blind source separation (BSS) when obtaining some underlying source signals from high dimensional observed signals. Among a vari...
Zhi-Lin Zhang, Liqing Zhang
IFIP
2007
Springer
15 years 6 months ago
Multicast in UMTS: Adopting TCP-Friendliness
In this paper, we present a novel mechanism for the multicast congestion control over UMTS networks. The proposed mechanism is based on the well known TCP-Friendly Multicast Conges...
Antonios G. Alexiou, Christos Bouras, Andreas Papa...
IJCNN
2006
IEEE
15 years 6 months ago
Prototype based outlier detection
— Outliers refer to “minority” data that are different from most other data. They usually disturb data mining process. But, sometimes they provide valuable information. Thus,...
Seungtaek Kim, Sungzoon Cho
ISWC
2005
IEEE
15 years 6 months ago
Recognizing Mimicked Autistic Self-Stimulatory Behaviors Using HMMs
Children with autism often exhibit self-stimulatory (or “stimming”) behaviors. We present an on-body sensing system for continuous recognition of stimming activity. By creatin...
Tracy L. Westeyn, Kristin Vadas, Xuehai Bian, Thad...